otsmr / internet-of-vulnerable-thingsLinks
The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.
☆16Updated 2 years ago
Alternatives and similar repositories for internet-of-vulnerable-things
Users that are interested in internet-of-vulnerable-things are comparing it to the libraries listed below
Sorting:
- Enumeration & fingerprint tool☆25Updated last year
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- My journey and notes on learning Offensive Security from the ground up☆18Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆14Updated last year
- Melee: Tool to Detect Infections in MySQL Instances☆22Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆23Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- ☆28Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 11 months ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 3 years ago
- A Red Teaming tool focused on profiling the target.☆26Updated this week
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Updated 2 years ago
- keep watching new bug bounty (vulnerability) postings.☆13Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆21Updated last year
- ☆14Updated 3 months ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 8 months ago
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆17Updated 10 months ago
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆47Updated last year
- Tools used for Pentesting☆22Updated 2 years ago
- DLink DIR-846 Authenticated Remote Code Execution☆18Updated last year
- https://www.nu11secur1ty.com☆23Updated last month
- Proof of Concept for CVE-2023-22906☆7Updated last year
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)☆23Updated 11 months ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago